|
|
Publications by year
Publications by date ·
all publications
2006 |
G. Ács, L. Buttyán, A taxonomy of routing protocols for wireless sensor networks, Híradástechnika, 2006, December. (Abstract) I. Zs. Berta, How to accept an electronic signature?, Híradástechnika, 2006, vol. LXI, 2006, in Hungarian. (Abstract) B. Bencsáth, I. Vajda, Internet Denial of Service attacks in game theoretical model (in hungarian), Alkalmazott Matematikai Lapok 23, 2006, pp. 335-348.. (Abstract)
G. Ács, L. Buttyán, I. Vajda, Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks, In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006, October.
(Abstract, PDF)
L. Buttyán, T. Holczer, I. Vajda, Optimal Key-Trees for Tree-Based Private Authentication, In Proceedings of the International Workshop on Privacy Enhancing Technologies (PET), 2006, June, Springer.
(Abstract, PDF)
Géza Szabó, B. Bencsáth, Protection against DHA attack with central filtering (in hungarian), Híradástechnika, 2006, vol. LXI, pp. pp. 2-9, 05.
G. Ács, L. Buttyán, I. Vajda, Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2006, vol. 5, no. 11.
(Abstract)
L. Buttyán, T. Holczer, I. Vajda, Providing Location Privacy in Automated Fare Collection Systems, In Proceedings of the 15th IST Mobile and Wireless Communication Summit, Mykonos, Greece, 2006, June.
(PDF)
L. Buttyán, P. Schaffer, I. Vajda, RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks, In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2006, ACM Press, October.
(Abstract, PDF)
L. Buttyán, P. Schaffer, I. Vajda, Resilient Aggregation with Attack Detection in Sensor Networks, Second IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), 2006, IEEE Computer Society Press, Pisa, Italy, March 13.
(Abstract, PDF) L. Buttyán, P. Schaffer, I. Vajda, book chapter in N.P.Mahalik (ed.), Sensor Networks and Configuration, Resilient Aggregation: Statistical Approaches, Springer, 2006, August. (Abstract)
Géza Szabó, B. Bencsáth, Statistical analysis of the results of the DHA protection system (in hungarian), Proceedings of Networkshop 2006 conference, NIIF, 2006, NIIF.
(Abstract, PDF) G. Ács, L. Buttyán, Útvonalválasztó protokollok vezeték nélküli szenzorhálózatokban, Híradástecnika, 2006, November. (Abstract)
L. Buttyán, L. Dóra, WiFi biztonság - A jó, a rossz, és a csúf, Híradástechnika, 2006, May.
(Abstract, PDF)
|
2005 |
I. Zs. Berta, L. Buttyán, I. Vajda, A framework for the revocation of unintended digital signatures initiated by malicious terminals, IEEE Transactions on Secure and Dependable Computing, 2005, vol. (Vol. 2, No. 3), pp. 268-272, July-September, http://csdl2.computer.org/.... (Abstract)
G. Ács, L. Buttyán, I. Vajda, Ad hoc útvonalválasztó protokollok bizonyított biztonsága, Híradástechnika, 2005, March.
(Abstract)
B. Bencsáth, Géza Szabó, Components to improve the protection against spam and viruses, HSN LAB Workshop, 2005, Jun.
(Abstract) M. Félegyházi, J. P. Hubaux, L. Buttyán, Cooperative Packet Forwarding in Multi-Domain Sensor Networks, Proceedings of the First International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2005), 2005, March.
B. Bencsáth, I. Vajda, Efficient Directory Harvest Attacks, Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, IEEE, IEEE Computer Society, 2005, William McQuay and Waleed W. Smari, IEEE, IEEE Computer Society, July.
(Abstract, PDF, PS)
I. Zs. Berta, Mitigating the attacks of malicious terminals, BME, 2005, http://www.crysys.hu/~isti/phd.
(Abstract, PDF) S. Capkun, J. P. Hubaux, L. Buttyán, Mobility Helps Peer-to-Peer Security, IEEE Transactions on Mobile Computing, 2005, to appear. M. Félegyházi, J. P. Hubaux, L. Buttyán, Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2005, to appear. N. B. Salem, L. Buttyán, J. P. Hubaux, M. Jakobsson, Node Cooperation in Hybrid Ad hoc Networks, IEEE Transactions on Mobile Computing, 2005, to appear.
Géza Szabó, Gábor Szabó, Possible protection methods against DHA attacks by the attackers recognition and centralized ban (in hungarian), Networkshop 2005 Konferencia, 2005.
(Abstract, PDF)
G. Ács, L. Buttyán, I. Vajda, Provable Security for Ad Hoc Routing Protocols, Híradástechnika, 2005, June.
(Abstract)
G. Ács, L. Buttyán, I. Vajda, Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks, In Proceedings of the Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14, 2005, 2005.
(Abstract, PDF)
L. Buttyán, T. Holczer, P. Schaffer, Spontaneous Cooperation in Multi-domain Sensor Networks, Lecture Notes in Computer Science, Springer Verlag, 2005, pp. Volume 3813 / 2005, pp. 42 - 53, Springer Verlag, Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop (ESAS), Visegrád, Hungary, July 13-14, 2005.
(Abstract, PDF) I. Zs. Berta, L. Buttyán, I. Vajda, Standards for Product Security Assessment, Chapter 53, in IT Security Handbook, edited by Hossein Bidgoli, John Wiley and Sons, 2005, (to appear).
I. Vajda, L. Buttyán, L. Dóra, Statistical Wormhole Detection in Sensor Networks, Lecture Notes in Computer Science, Springer-Verlag GmbH, 2005, Refik Molva, Gene Tsudik, Dirk Westhoff, pp. Volume 3813/ 2005, pp. 128 - 141, Springer-Verlag GmbH, Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005.
(Abstract, PDF)
Gábor Szabó, Géza Szabó, The applied Spam-filtering methods and the Sender ID in Hungary (in hungarian), Proceedings of Networkshop 2005 conference, 2005.
(Abstract, PDF)
|
2004 |
L. Buttyán, J. P. Hubaux, S. Capkun, A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson's Protocol, Journal on Computer Security, 2004, vol. 12, no. 3-4, pp. 551-587.
(Abstract, PDF, PS)
B. Bencsáth, T. Tuzson, B. Tóth, T. Tiszai, G. Szappanos, E. Rigó, Sz. Pásztor, M. Pásztor, P. Papp, P. Orvos, P. Mátó, B. Martos, L. Kún, Z. Kincses, T. Horváth, M. Juhász, B. K. Erdélyi, A. Bogár, G. Vid, Az informatikai hálózati infrastruktúra biztonsági kockázatai és kontrolljai, IHM - MTA-SZTAKI, 2004.
(Abstract, PDF)
B. Bencsáth, Az internetes vírus- és spamvédelem rendszerszemléletben, HISEC 2004 konferencia, 2004, 10., Budapest, in Hungarian.
(Abstract, PDF, PPT) M. Félegyházi, J. P. Hubaux, L. Buttyán, Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Dynamic Case, Proceedings of the 2nd Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2004), 2004, March. I. Zs. Berta, I. Vajda, L. Buttyán, B. Bencsáth, T. Veiland, HUNEID - Hungarian Electronic ID smart card specifications, Ministry of Informatics and Telecommunications (www.ihm.hu), 2004, http://www.itktb.hu/engine.aspx?page=showcontent&content;=ias.
L. Buttyán, T. Holczer, P. Schaffer, Incentives for Cooperation in Multi-hop Wireless Networks (in Hungarian), Híradástechnika, 2004, March.
(Abstract, PDF)
I. Zs. Berta, I. Vajda, Limitations of humans when using malicious terminals, Tatra Mountains Mathematical Publications, 2004, (to appear).
(Abstract, PDF)
I. Zs. Berta, L. Buttyán, I. Vajda, Mitigating the Untrusted Terminal Problem Using Conditional Signatures, Proceedings of International Conference on Information Technology ITCC 2004, IEEE, 2004, IEEE, Las Vegas, NV, USA, April.
(Abstract, PDF) L. Zombik, L. Buttyán, Modelling Location Reveal Attacks in Mobile Systems, Periodica Polytechnica, 2004, vol. 48, no. 1-2, pp. 85-100.
I. Zs. Berta, L. Buttyán, I. Vajda, Privacy Protecting Protocols for Revokable Digital Signatures, Proceedings of Cardis 2004, Toulouse, France (to appear), Kluwer, 2004, Kluwer.
(Abstract, PDF)
B. Bencsáth, I. Vajda, Protection Against DDoS Attacks Based On Traffic Level Measurements, 2004 International Symposium on Collaborative Technologies and Systems, The Society for Modeling and Simulation International, 2004, Waleed W. Smari, William McQuay, pp. 22-28., The Society for Modeling and Simulation International, San Diego, CA, USA, January, Simulation series vol 36. no. 1., ISBN 1-56555-272-5.
(Abstract, PDF, PS)
G. Ács, L. Buttyán, I. Vajda, Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks, http://eprint.iacr.org/ under report number 2004/159., 2004, March.
(Abstract) I. Zs. Berta, B. Bencsáth, Sending authentic messages from malicious terminals, Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004, NIIF, Hungary. (Abstract)
B. Bencsáth, The problems and connections of network virus protection and the protection against denial of service attacks, Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004, NIIF, Hungary.
(Abstract, PDF, PPT) L. Buttyán, I. Vajda, Towards Provable Security for Ad Hoc Routing Protocols, Proceedings of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004), ACM, 2004, ACM, October.
B. Bencsáth, I. Vajda, Trap E-mail Address for Combating E-mail Viruses, Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks, University of Split, 2004, pp. 220-224, University of Split, October.
(PDF, PS)
I. Zs. Berta, Why are not digital signatures spreading as quickly as it was expected?, MBA dissertation, Buckinghamshire Chilterns University College, Buckinghamshire Business School, Számalk Open Business School, 2004.
(PDF)
|
2003 |
N. B. Salem, L. Buttyán, J. P. Hubaux, M. Jakobsson, A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks, 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), 2003, June.
(Abstract)
B. Bencsáth, L. Buttyán, I. Vajda, A game based analysis of the client puzzle approach to defend against DoS attacks, Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, 2003, pp. 763-767, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split.
(Abstract, PDF, PS) M. Jakobsson, J. P. Hubaux, L. Buttyán, A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks, Proceedings of Financial Crypto 2003, 2003, La Guadeloupe, January. (Abstract)
I. Zs. Berta, I. Vajda, Documents from Malicious Terminals, SPIE's Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, Grand Canaria, Spain, 2003.
(Abstract, PDF)
M. Félegyházi, L. Buttyán, J. P. Hubaux, Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Static Case, 8th International Conference on Personal Wireless Communications (PWC 2003), 2003, September.
(Abstract) F. Gaertner, L. Buttyán, K. Kursawe, From Fault-Tolerance to Security and Back, IEEE Distributed Systems Online, 2003, vol. 4, no. 9.
I. Zs. Berta, I. Berta, Hardware and Software Security I, Elektrotechnika, 2003, vol. 2003/10, pp. 4.
(PDF)
I. Zs. Berta, I. Berta, Hardware and Software Security II, Elektrotechnika, 2003, vol. 2003/11, pp. 4.
(PDF)
I. Vajda, L. Buttyán, Lightweight Authentication Protocols for Low-Cost RFID Tags, 2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003, 2003, October.
(Abstract) I. Vajda, I. Zs. Berta, Limitations of users when using malicious terminals, Third Central European Conference on Cryptography (Tatracrypt'03), 2003.
S. Capkun, J. P. Hubaux, L. Buttyán, Mobility Helps Security in Ad Hoc Networks, 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), 2003, June.
(Abstract)
L. Buttyán, J. P. Hubaux, Report on a Working Session on Security in Wireless Ad Hoc Networks, ACM Mobile Computing and Communications Review (MC2R), 2003, vol. 7, no. 1, March.
(PDF)
S. Capkun, L. Buttyán, J. P. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), ACM, 2003, ACM, October.
(Abstract)
S. Capkun, L. Buttyán, J. P. Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2003, vol. 2, no. 1, January-March.
(Abstract)
L. Buttyán, J. P. Hubaux, Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, ACM/Kluwer Mobile Networks and Applications, 2003, vol. 8, no. 5, October.
(PDF)
|
2002 |
L. Buttyán, S. Capkun, J. P. Hubaux, A Formal Analysis of Syverson`s Rational Exchange Protocol, Proceedings of IEEE Computer Security Foundations Workshop, 2002, Cape Breton, Nova Scotia, Canada, June.
(Abstract, PDF) B. Bencsáth, I. Vajda, A game theoretical approach to optimizing of protection against DoS attacks, presented on the Second Central European Conference on Cryptography (Hajducrypt), Július, 2002, (no proceedings).
L. Buttyán, I. Zs. Berta, I. Vajda, Eliminating Man-in-the-Middle attacks of Malicious Terminals, Workshop organised by the IST Coordination Point of the Ministry of Education, Budapest, 2002.
(Abstract)
B. Bencsáth, I. Zs. Berta, Empiric examination of random number generators of smart cards, HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002, BME.
(PDF)
I. Zs. Berta, Z. Á. Mann, Evaluating Elliptic Curve Cryptography on PC and Smart Card, Periodica Polytechnica, Electrical Engineering, 2002, vol. 46/1-2, pp. 47-75.
(PDF, PS)
I. Vajda, Extraction of random bits for cryptographic purposes, Tatra Mountains Mathematical Publications, 2002, vol. 25, pp. 83-99.
(PS)
I. Verók, Formal Verification of JavaCard Application Security Properties, HTE-BME 2002 Korszerű távközlő és informatikai rendszerek és hálózatok konferencia, Budapest University of Technology and Economics, 2002, Budapest University of Technology and Economics.
(PDF)
I. Zs. Berta, I. Berta, Hardware and Software Security, Magyar Elektrotechnikai Egyesület XLIX. vándorgyülés, Sopron, 2002.
I. Zs. Berta, I. Vajda, Message Authentication using Smart Card and Biometry, Second Central European Conference on Cryptography (HajduCrypt) 2002, Debrecen, Hungary, 2002.
(Abstract)
L. Buttyán, S. Capkun, J. P. Hubaux, Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, Proceedings of The ACM New Security Paradigms Workshop 2002, 2002, pp. 8, Norfolk, Virginia Beach, USA, September.
(Abstract, PDF)
I. Zs. Berta, The problem of sending authentic messages from insecure terminals, HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002, BME.
|
2001 |
I. Verók, A Mobile Agent Bidirectional One-to-Many Communications Framework, BME, 2001.
N. B. Salem, L. Buttyán, A Payment Scheme for Broadcast Multimedia Streams, Proceedings of 6th IEEE Symposium on Computers and Communications, 2001, Hammamet, Tunisia, July.
(Abstract, PS)
L. Buttyán, Building Blocks for Secure Services: Authenticated Key Transport and Rational Exchange Protocols, Swiss Federal Institute of Technology (EPFL), 2001, December.
(Abstract, PDF)
I. Verók, Cahoots: A Mobile Agent Bidirectional One-to-Many Communications Framework, Budapest University of Technology and Economics, 2001.
(PDF)
B. Bencsáth, I. Vajda, Collecting randomness from the net, Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001, Kluwer, 2001, pp. 105-111, Kluwer, May.
(Abstract, PDF, PS)
I. Zs. Berta, Z. Á. Mann, Cryptographic application of programmable smart cards, Proceedings of NetWorkshop'2001, 2001.
(PDF)
L. Buttyán, A. Nagy, I. Vajda, Efficient Multi-Party Challenge-Response Protocols for Entity Authentication, Periodica Polytechnica, 2001, vol. 45, no. 1, pp. 43-64, April.
(Abstract, PDF) L. Buttyán, E. Wiedmer, E. Lauper, Method for transmitting payment information between a terminal and a third equipment, May, 2001, International Patent Application.
L. Buttyán, J. P. Hubaux, Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks, EPFL-DI-ICA, 2001, no. DSC/2001/001, January.
(Abstract, PS) M. Hegedüs, On-line tőzsdei kereskedési adatfeldolgozó rendszer fejlesztése és statisztikai elemzések napon belüli kereskedéshez, BME, 2001. M. Perényi, On-line tőzsdei kereskedési adatfeldolgozó rendszer fejlesztése és statisztikai elemzések napon belüli kereskedéshez, BME, 2001. I. Berta, Programozható chipkártya biztonsági alkalmazásai, BME, 2001.
L. Buttyán, J. P. Hubaux, Rational Exchange -- A Formal Model Based on Game Theory, Proceedings of 2nd International Workshop on Electronic Commerce (WELCOM 2001), 2001, Heidelberg, Germany, November.
(Abstract, PS)
I. Zs. Berta, Security of programmable smart cards, Budapest University of Technology and Economics, 2001.
(Abstract, PDF)
L. Blazevic, L. Buttyán, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec, Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes, IEEE Communications Magazine, 2001, vol. 39, no. 6, June.
(Abstract, PS)
L. Buttyán, J. P. Hubaux, Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, EPFL-DI-ICA, 2001, no. DSC/2001/046, August.
(Abstract, PS)
J. P. Hubaux, L. Buttyán, S. Capkun, The Quest for Security in Mobile Ad Hoc Networks, Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001, Long Beach, CA, USA, October.
(Abstract, PS)
|
2000 |
I. Verók, A Decentralized Marketplace Composed of Mobile Intelligent Agents, Scientific student circles (TDK), 2000.
(PDF)
U. Wilhelm, S. Staamann, L. Buttyán, A Pessimistic Approach to Trust in Mobile Agent Platforms, IEEE Internet Computing, 2000, vol. 4, no. 5, pp. 40-48, September.
(PDF)
I. Zs. Berta, Z. Á. Mann, Analysis of public key cryptography based on elliptic curves in smart card and PC environment, Scientific student circles (TDK) 2000, Budapest University of Technology and Economics, 2000.
S. Tihanyi, Biztonságos anonim hálózati kommunikációs rendszer, BME, 2000.
L. Buttyán, J. P. Hubaux, Enforcing Service Availability in Mobile Ad-Hoc WANs, EPFL-DI-ICA, 2000, no. DSC/2000/025, May.
(Abstract, PDF)
L. Buttyán, J. P. Hubaux, Enforcing Service Availability in Mobile Ad-Hoc WANs, Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), 2000, Boston, MA, USA, August.
(Abstract, PS) L. Györfi, Á. Jordán, I. Vajda, Exact decoding error probability for slow frequency hopping, European Transactions on Telecommunication, 2000, vol. 11, no. 2, pp. 183-190, March/April.
L. Buttyán, C. Gbaguidi, S. Staamann, U. Wilhelm, Extensions to an Authentication Technique Proposed for the Global Mobility Network, IEEE Transactions on Communications, 2000, vol. 48, no. 3, March.
(Abstract, PDF) B. Bencsáth, S. Tihanyi, Home-made methods for enhancing network security (in Hungarian), Magyar Távközlés, 2000, vol. X, no. 4, pp. 22-27.. B. Korossy Khayll, Intelligens ügynök az elektronikus kereskedelemban, BME, 2000. L. Buttyán, E. Wiedmer, E. Lauper, Method for securing communications between a terminal and an additional user equipment, September, 2000, International Patent Application. T. Németh, Nyilvános kulcsú kriptográfiai megoldás elektronikus banki szolgáltatásra, BME, 2000.
I. Zs. Berta, Z. Á. Mann, Programmable smart cards and their security, Magyar Távközlés, 2000, 4.
(PDF)
L. Buttyán, Removing the financial incentive to cheat in micropayment schemes, IEE Electronics Letters, 2000, vol. 36, no. 2, pp. 132-133, January.
(Abstract, PDF) B. Bencsáth, Simple, free encrypted tunnels using linux, Presented on Networkshop 2000, Gödöllő, Hungary, 2000, http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm. Smart Card technológiát alkalmazó Internetes fizetési rendszer, BME, 2000.
I. Zs. Berta, Z. Á. Mann, Smart Cards - Present and Future, Híradástechnika, Journal on C5, 2000, 12.
(PDF) I. Vajda, B. Bencsáth, A. Bognár, Tanulmány a napvilágra került Elender jelszavakról, 2000, Apr.. (Abstract)
J. P. Hubaux, J. Y. Le Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Buttyán, M. Vojnovic, Toward Mobile Ad-Hoc WANs: Terminodes, EPFL-DI-ICA, 2000, no. DSC/2000/006, February.
(Abstract, PDF) B. Bencsáth, Virtuális magánhálózatok kiépítése és auditálása, BME, 2000.
|
1999 |
L. Buttyán, J. P. Hubaux, Accountable Anonymous Access to Services in Mobile Communication Systems, Proceedings of 18th IEEE Symposium on Reliable Distributed Systems, Workshop on Electronic Commerce, 1999, pp. 384-389, Lausanne, Switzerland, October.
(Abstract, PS)
L. Buttyán, J. P. Hubaux, Accountable Anonymous Service Usage in Mobile Communication Systems, EPFL-DI-ICA, 1999, no. SSC/99/16, May.
(Abstract, PS)
L. Buttyán, S. Staamann, A. Coignet, E. Ruggiano, U. Wilhelm, M. Zweiacker, Closed User Groups in Internet Service Centres, Proceedings of DAIS`99, 1999, Helsinki, June.
(Abstract, PS)
L. Buttyán, Formal methods in the design of cryptographic protocols (state of the art), EPFL-DI-ICA, 1999, no. SSC/1999/38, November.
(Abstract, PS) D. Labanc, Internetes értékpapír-megbízásokat kezelő rendszer, 1999.
U. Wilhelm, S. Staamann, L. Buttyán, Introducing Trusted Third Parties to the Mobile Agent Paradigm, Proceedings of Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag (LNCS 1603), 1999, J. Vitek, C. Jensen, pp. 471-491, Springer-Verlag (LNCS 1603), January.
(Abstract, PS)
S. Staamann, U. Wilhelm, L. Buttyán, Multilateral Security in Middleware Based Telecommunications Architectures, Proceedings of Multilateral Security in Communications, Addison-Wesley, 1999, G. Mueller and K. Rannenberg, pp. 381-386, Addison-Wesley, July.
(Abstract, PS)
I. Zs. Berta, Z. Á. Mann, Possibilities of authenticity using intelligent smart card, Scientific student circles (TDK) 1999, Budapest University of Technology and Economics, 1999.
(Abstract, PDF)
B. Bencsáth, S. Tihanyi, Problem areas of the security aspects of network operating systems, Scientific student groups (TDK) 1999, 1999.
(PDF) I. Kiss, SmartCardos mobiltelefonokkal megvalósított biztonságos elektronikus fizetőeszköz, BME, 1999.
L. Buttyán, J. P. Hubaux, Toward a Formal Model of Fair Exchange - a Game Theoretic Approach, EPFL-DI-ICA, 1999, no. SSC/1999/39, December.
(Abstract, PDF)
|
1998 |
C. Gbaguidi, S. Staamann, U. Wilhelm, L. Buttyán, A Note on an Authentication Technique Based on Distributed Security Management for the Global Mobility Network, EPFL-DI-ICA, 1998, no. SSC/98/18, April.
(Abstract, PS)
L. Buttyán, S. Staamann, U. Wilhelm, A Simple Logic for Authentication Protocol Design, Proceedings of IEEE Computer Security Foundations Workshop, 1998, pp. 153-162, Rockport, MA, USA, June.
(Abstract, PS) L. Györfi, I. Vajda, Analysis of Protocol Sequences for Slow Frequency Hopping, Wireless Networks, 1998, vol. 4, pp. 411-418. S. Csibi, L. Györfi, I. Vajda, Analysis of Protocol Sequences for Slow Frequency Hopping, Proceedings of the 1998 International Zürich Seminar on Broadband Communication (IEEE Catalog No.98TH8277), 1998, pp. 237-242.
S. Staamann, U. Wilhelm, L. Buttyán, CrySTINA: Security in the Telecommunications Information Networking Architecture, EPFL-DI-ICA, 1998, no. SSC/98/4, January.
(Abstract, PS) Á. Csernitzky, Internetes telebanki szolgáltatás és a szerver oldali adatbiztonsága, BME, 1998. Á. Jordán, I. Vajda, On the distribution of Hamming correlation of cyclically permutable subsets of RS codes, Proceedings of the II. International Workshop on Optimal Codes'98, 1998, pp. 144-150, Sazopol,Bulgaria, June 9-15. Á. Jordán, I. Vajda, On the Hamming correlation distribution of SFH signature sequence sets, roceedings of the IEEE ISSSTA '98 (IEEE Fifth International Symposium on Spread Sectrum Techniques & Applications), 1998, pp. 676-680, Sun City, South Africa, September 2-4.
U. Wilhelm, S. Staamann, L. Buttyán, On the Problem of Trust in Mobile Agent Systems, Proceedings of Internet Society`s Symposium on Network and Distributed System Security, 1998, San Diego, CA, USA, March.
(Abstract, PS)
U. Wilhelm, S. Staamann, L. Buttyán, Protecting the Itinerary of Mobile Agents, Proceedings of ECOOP Workshop on Mobile Object Systems: Secure Internet Mobile Communications, 1998, Brussels, Belgium, June.
(Abstract, PS)
S. Staamann, U. Wilhelm, L. Buttyán, Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach, EPFL-DI-ICA, 1998, no. SSC/98/4, January.
(Abstract, PS)
S. Staamann, U. Wilhelm, L. Buttyán, Security in TINA, Proceedings of IFIP-SEC`98, 1998, Wienna-Budapest, August.
(Abstract, PS)
|
1997 |
Zs. Nagy, A hitelkártyás vásárlás SET (Secure Electronic Transaction) draft standard adatbiztonsági protokolljának vizsgálata, BME, 1997. Zs. Szabadi, Biztonságos kommunikáció X400 MTA és Web Browser ügyfél alkalmazás között, BME, 1997. L. Buttyán, Data Security Issues of Computer Networks, Magyar Távközlés (Selected Papers from the Hungarian Telecommunications), 1997, pp. 50-57.. L. Buttyán, I. Vajda, On the Design of Strong Bit Permutations and Substitutions, Budapest University of Technology, 1997, January. I. Vajda, L. Buttyán, On the Design of Substitution-Permutation Ciphers, Budapest University of Technology, 1997, January.
S. Staamann, U. Wilhelm, A. Schiper, L. Buttyán, J. P. Hubaux, Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach, Proceedings of TINA`97, 1997, November.
(Abstract, PS)
|
1996 |
L. Buttyán, Data Security Issues of Computer Networks (in Hungarian), Magyar Távközlés, 1996, vol. VII., no. 4., pp. 11-19., April.
|
1995 |
I. Vajda, Code construction for FH/CDMA channels, IEEE Transactions on Communications, 1995, vol. 43, no. 10, October. K. Rassay, Nyílt számítógépes hálózatok adatvédelmi kérdései, BME, 1995. I. Vajda, L. Buttyán, On Design Criteria of Conventional Block Ciphers (in Hungarian), Hiradástechnika, 1995, vol. XLVI., pp. 10-18., March, (awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society). L. Buttyán, S-box Design, (in Hungarian), Budapest University of Technology, 1995, May. L. Buttyán, I. Vajda, Searching for the best linear approximation of DES-like cryptosystems, IEE Electronics Letters, 1995, vol. 31, no. 11, pp. 873-874, May.
|
1994 |
I. Vajda, Code Constructions for Code Division Multiple Access Channels, Journal on Communications, 1994, vol. XLV, pp. 2-9, March.
|
1993 |
L. Györfi, I. Vajda, Construction of Protocol Sequences for Multiple-Access Collision Channels, Proceedings of the 1993 IEEE International Symposium on Information Theory, 1993, pp. 157, San Antonio, USA, Jan 17-22. I. Vajda, Spread Spectrum Principle Based Wireless Telecommunication Networks, Magyar Távközlés, 1993, pp. 43-49, Selected papers 1993.
|
1992 |
I. Vajda, Code sequences for FH-CDMA channels, Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, 1992, pp. 195-197, Yokohama, Japan. L. Györfi, I. Vajda, Construction of Protocol Sequences for Multiple-Access Collision Channel without Feedback, IEEE Transactions on Information Theory, 1992, vol. 39, no. 5, pp. 1762-1765, September. Gy. Hernádi, Lokális számítógéphálózatok algoritmikus adatvédelme, BME, 1992.
|
1991 |
T. Nemetz, I. Vajda, A cryptographic element based on number system conversion, Proceedings of 1991 IEEE International Symposium on Information Theory, 1991, pp. 127, Budapest, Hungary. I. Vajda, Comments on Code-Division Multiple Access Techniques in Optical Fiber Networks, IEEE Transactions on Communications, 1991, vol. 39, no. 2, pp. 196, February. T. Szántó, Reed-Solomon kódok alkalmazási lehetőségei az adatvédelemben, BME, 1991. I. Vajda, Side information gained from signal matrices in FFH spread spectrum systems, Electronics and Communications, 1991, vol. 45, no. 2, pp. 70-76, March, Hirzel Verlag. I. Vajda, T. Nemetz, Substitution of characters in q-ary m-sequences, Lecture Notes in Computer Science 5O8, 1991, pp. 96-105, Springer-Verlag.
|
1990 |
I. Vajda, AGC based hard detected FFH signal matrices, IEE Electronics Letters, 1990, vol. 26, no. 3, pp. 218-219, February. I. Vajda, On random code-hopping DS/SSMA systems, Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, 1990, pp. 47-52, London.
|
1987 |
I. Vajda, G. Einarsson, Code acquisition for a frequency hopping system, IEEE Transactions on Communications, 1987, vol. 35, no. 5, pp. 566-568, May. G. Einarsson, I. Vajda, L. Molnár, Error probability of a code-division multiple-access frequency-hopping system, Electronics and Communications, 1987, vol. 41, no. 6, pp. 356-364, December, Hirzel Verlag. I. Vajda, J. Landsmann, Some results on generation of shift-register sequences with large linear complexity, Proceedings of Applied Algebra, Algebraic Algorithms and Error Control Codes, AAECC-5, 1987, pp. 81, Menorca, Spain, June 15-19.
|
1985 |
I. Vajda, More on modelling and performance evaluation for frequency coded multiple access channels, Proceedings of U.R.S.I. XXIst General Assembly, 1985, pp. 104, Florence, Italy.
|
1983 |
I. Vajda, A coding rule for frequency-hopped multiple access channels, Problems of Control and Information Theory, 1983, vol. 13, no. 5, pp. 331-335. L. Györfi, I. Vajda, Block coding and correlation decoding for an M-user weighted adder channel, Problems of Control and Information Theory, 1983, vol. 12, no. 6, pp. 405-417. L. Molnár, I. Vajda, Decoding error probability of the Einarsson-code for frequency-hopped multiple access channel, Problems of Control and Information Theory, 1983, vol. 13, no. 2, pp. 109-120.
|
1980 |
S. Csibi, L. Györfi, Z. Györfi, I. Vajda, Information transmission with intermediate storage under the special conditions of microcomputers, Periodica Polytechnica, 1980, vol. 24, pp. 222-227. L. Györfi, I. Vajda, Upper bound on the error probability of detection in non-Gaussian noise, Problems of Control and Information Theory, 1980, vol. 9, no. 3, pp. 215-224.
|
1979 |
I. Vajda, I. Kerekes, L. Györfi, H. Gomez, Remarks on a coding technique for asynchronous multiple access communication, Problems of Control and Information Theory, 1979, vol. 9, no. 4, pp. 287-296.
|
1978 |
I. Vajda, Adaptive Gaussian detection without a priori symbol synchronization, Problems of Control and Information Theory, 1978, vol. 9, no. 2, pp. 133-140. L. Györfi, Z. Györfi, I. Vajda, Bayesian decision with rejection, Problems of Control and Information Theory, 1978, vol. 8, no. 5, pp. 445-452.
|
1977 |
L. Györfi, Z. Györfi, I. Vajda, A strong law of large numbers and some applications, Studia Scientiarum Mathematicarum Hungarica, 1977, vol. 12, pp. 233-244.
|
|